Systems and Methods for Providing Network-Wide, Traffic-Aware Dynamic Acceleration and Admission Control for Peer-to-Peer Based Services
In one aspect, the invention provides systems and methods for providing users with a peer-to-peer (P2P) acceleration service over any form of broadband access.
1. Field of the Invention
The present invention relates generally to peer-to-peer (P2P) based services, and, in some embodiments, to systems and methods for forming a P2P distribution network and providing users of a network service provider (NSP) with a P2P acceleration service over any form of broadband access. Besides P2P acceleration, embodiments of the invention may be used to distribute efficiently new walled garden (WG) based services, such as video-on-Demand (VoD), thereby enabling new NSP business models. Moreover, by using systems and methods disclosed herein, new quality-of-service (QoS) and admission control (AC) methods may be addressed. Accordingly, major savings can be achieved where the bandwidth and network resources compound annual growth rate (CAGR) is likely to cross the 100% rate.
2. Discussion of the Background
P2P architecture, in contrast to client/server architecture, is a type of network architecture in which each node (i.e., client software) has equivalent capabilities. Often P2P architecture is implemented by giving each node both server and client capabilities. Typically each node is referred to as a “peer.”
In recent usage, P2P has come to describe applications in which users can exchange files with each other over the Internet, either directly or through a mediating server. Popular recent examples of programs for connecting to such file-sharing networks are DC++, Kazaa and WinMX.
P2P is advantageous because it reduces the computing resources and connectivity requirements for the content owners and distributors. Moreover, the traffic model becomes symmetric. Everyone is both a content server and a content downloader, while central servers can be used as central repositories for an efficient lookup providing lists of “who owns what.” It is the nature of P2P to be rate aware so as to utilize the fastest uplinks available. Early signs from the main operating systems vendors indicate that P2P is perceived as the next generation of large content distribution. All major desktop computer vendors have built in P2P functionalities.
Current challenges faced by network service providers originate from the fact that P2P encourages the use of higher broadband speeds, and, in its current form, disrupts the broadband business model and becomes a threat due to the growth of P2P non revenue transit traffic, which traffic growth forces the continuous upgrade of the network resources without providing compensation.
Current methods for Internet traffic admission control are based on edge routers, such as broadband remote access servers (BRAS), which authenticate the remote user and assign to the user an ISP address. This class is known as “static” and provides Internet access service (over first/last mile) and shapes the down-stream traffic (asymmetric traffic web model), but are unable to address the dynamic and symmetric network-wide nature of P2P. Moreover, the entire P2P traffic is routed through the ISP, as shown in
Accordingly, it is one object of the present invention to form a P2P network and provide users with P2P acceleration service over any form of broadband access (e.g., DSL, Cable, Optical, Mobile and Wireless). Another object is to provide a P2P service platform for value added services over P2P (VASoP2P). It is a further object of the present invention to provide a P2P Router for network-wide, traffic-aware and dynamic admission control of P2P traffic. Another object is to use a P2P protocol as one of the main network core protocols. It is still another object to provide a “P2P control plane,” which is preferably complementary to providers who have decided to develop an “Internet Protocol Multimedia Subsystem (IMS) based control plane” or any other control plane.
A P2P acceleration service according to an embodiment of the invention provides a fast Internet based P2P service to users. This service will drastically enhance the user experience as compared to standard P2P. The effect, from the network service provider's point of view, is considered as “cleansing” the network of standard P2P. For this service, in some embodiments, the user must use a P2P client provided by the user's NSP. Upon using this client, the NSP will regulate the network traffic in the most efficient way to meet the user's service level agreement (SLA). The user using that service is aware of being part of file sharing both as a sender (seed) and as a downloader (leech) (for the sake of consistency, we will use the biTorrent P2P terms through out this patent, without losing the generality of using any P2P client). The benefit to the NSP is lowering the off-net traffic (outgoing and incoming traffic), which otherwise may require major upgrades.
A P2P service platform according to an embodiment of the invention enables introduction of new wallet garden P2P based accelerated content distribution services (such as “on demand” streaming distribution services), which could be provided over the broadband infrastructure without the need for new overly complicated control planes and access upgrades. For that service, in some embodiments, the user must use a P2P client as provided by the user's NSP. Upon using this client, the NSP will regulate the network traffic in the most efficient way to meet the user's service level agreement.
In one embodiment, a P2P router for providing the P2P acceleration service and/or service platform is updated by a tracker server with information regarding relevant swarms so that the P2P router may compute quality-of-service and/or access control shaping policies.
The above and other embodiments of the present invention are described below with reference to the accompanying drawings.
The accompanying drawings, which are incorporated herein and form part of the specification, illustrate various embodiments of the present invention. In the drawings, like reference numbers indicate identical or functionally similar elements.
As used herein, the words “a” and “an” mean “one or more.”
Each access node 101, typically, is located at an exchange building that provides the interfaces to the copper and fiber cables to user sites. Typically, each access node 101 provides access media gateway functionality for voice, data and video services on the core Internet Protocol (“IP”) based network. A “last mile” virtual connection (“VC”) (e.g., a virtual circuit, virtual local area network (“VLAN”) or other virtual connection) identifier can be provisioned for subscribed users dedicated to Internet based “best effort” or any other purposes. For example, in case of Ethernet VLAN technology being used as the last mile, the identifier may be a VLAN tag.
An ISP 104 manages the standard P2P Internet traffic, wherein admission control is based on edge routers such as broadband access remote server (“BRAS”) (also known as “LNS”), which authenticates the remote user and assigns him a public routable address from the ISP space (e.g., via the PPPoE protocol). In case that the NSP terminates the PPPoE it will be done at the BRAS or at the Layer 2 Access Concentrator (LAC) level. LNS-LAC connectivity is usually maintained over L2TP (Layer 2 Tunneling Protocol) Link. These well known standards are basis for the standard “always-on best-effort” service.
A walled garden (WG) network 133 is also shown in
Seeding/leeching content via a remote Internet peer 113 is provided by the means of the swarm controlled by the “tracker” 112 (biTorrent terminology) somewhere in the global Internet space 110, such that NSP user 103 using a typical P2P client is able to maintain P2P connectivity over the Internet. However, this connectivity is based on the best-effort service provided over VC1.
As illustrated in
As illustrated in
In some embodiments, P2P router 304 may also create a P2P control plane over the NSP network 300. The P2P control plane, in some embodiments, provides an automated real time adaptive quality-of-service plane without the need for traffic engineering.
In some embodiments, the access networks' available up/down bandwidth at each peer are automatically taken into consideration by a P2P tracker algorithm (I-TrS) via standard score assigned to each peer. File sharing is done and controlled from the NSP itself via the dedicated P2P pipes, thereby enabling the best quality-of-service available. Note that this provides an alternative adaptive ‘self adjustable’ method to the existing one in which the ISP centrally manage and control the end user via a central edge router (such as a BRAS (LNS)). The P2P traffic managed according to a method of the present invention is completely distributed and managed by the peer clients themselves, thus providing real time adaptive quality-of-service based on the available uplink and downlink bandwidth and score controlled by the swarm tracker (I-TrS).
In some embodiments, the P2P control plane ensures that P2P acceleration starts once the content is resident or partially resident in one of the accelerated P2P peers (i.e., the P2P clients that connect to access network 109 via a P2P pipe as well as all of the I-PAPs 372). Note that until all the content pieces are resident in the NSP, the remaining pieces continue to be imported (e.g., from the Internet). Additionally, behavioral content demand is preferably included in the P2P algorithm in order to have the expected content available locally or at another closed network site ready for use.
As further illustrated in
In some embodiments, P2P distribution is controlled by the I-TrS and proprietary rights will be checked according to digital rights management (DRM). For those swarms requiring payment, payment verification may be done via the I-TrS server (DRM attributes), and the system will be informed of such.
Besides the novelty of the creation of a P2P pipe and control plane, it is observed that with the same access node and BRAS equipment used, the NSP is capable to provide the acceleration, and any other service that utilizes the P2P protocol.
P2P model may also include a walled garden acceleration system. Walled garden acceleration system may provide value added services over P2P and may include: a walled garden peer acceleration proxy (“W-PAP”) 382, a walled garden tracker server (“W-TrS”) 384, and a domain-name server (“DNS”) 386.
W-PAP 382 is configured to enable downloading of content from content providers to the NSP network (not necessarily using P2P techniques), and format it such that it could be distributed over to end user nodes (e.g., node 103) using a P2P protocol. W-TrS 384 is configured to serve as a tracker server for the walled garden accelerated content. DNS 386 is configured to enable acceleration or downloading of pre-stored content.
As explained above, I-TrS 374 is the NSP's tracker server, which is used to track the private or accelerated swarms over NSP network 300. Because I-PAP 372 is a member of the swarms tracked by I-TrS 374 as well as a member of the public swarms, it is guaranteed that any missing chunk of data for swarms tracked by I-TrS 374 will be downloaded quickly from the Internet by I-PAP 372.
Because P2P acceleration takes place over VC2 (“the P2P pipe”), quality-of-service can be controlled by the NSP. Note also that content acceleration is achieved by downloading from the Internet in a fast way all swarms' missing chunks by I-PAP 372 by using P2P router 304. The address pools allocated to the accelerated peers 103 are controlled by the NSP (assign geographical pools by BRAS/Radius for example), in such a way, the P2P distribution in the NSP network can be controlled by BRAS 150 and not by the ISP's LNS, as is done for the non-accelerated P2P flows.
Referring now to
Note that when a peer client 103 requires a specific chunk from a specific content object (e.g., movie file or other content object), I-PAP 372 will form or be part of the relevant content swarm over the global Internet. In that way, I-PAP 372 will be a joint member of the private swarms and the associated public swarms. Any missing chunk for any private swarm will be known to the I-PAP 372, and, as such, will be downloaded in the fastest way due to the guaranteed high score of the I-PAP 372 in any public swarm. In this manner, the P2P acceleration will be guaranteed for getting the fast completion time. Note that all the accelerated P2P control flows to/from the Internet and between the NSP peers are controlled via P2P router 304.
Referring now to
Once a swarm is created by one of the accelerated P2P peers 3,4 to get a specific content object (p2p clients 3,4 are configured with the I-TrS 374 server address such that all the content requests are forwarded to that I-TrS), I-TrS 374, which behaves as the tracker for that swarm, will indicate to I-PAP 372 all the internet peers containing the missing chunks in the requested object (I-TrS 374 knows which chunks are missing by exchanging updates with Internet trackers 112). I-PAP 372 will search for remote Internet peers that have the missing data and create a public swarm to download the missing chunks. I-PAP 372 is able to find the remote Internet peers that have the missing chunks because I-TrS 374 provides to I-PAP 372 the IP addresses of the Internet peers containing the missing chunks. Once the missing chunks are obtained by I-PAP 372, fast internal acceleration will take place over the P2P pipes from I-PAP 372 to the accelerated P2P peer that created the swarm.
Note that all the accelerated flows traverse through the BRAS 150 by routing the private addresses assigned to the P2P clients (IP Pools assigned for P2P acceleration service, for example: pool per BRAS). The non-accelerated P2P flows will be transparently forwarded to the NSP network by means of public ISP addresses assigned to the non-accelerated peers.
Any content can be downloaded through the Internet or directly (not necessarily by P2P method). ISP connectivity is not required, and any wholesale agreement can be used. The distribution within NSP network 300 can utilize P2P methods via a P2P peer 103 geared for value added services (the same way Internet content is distributed via P2P), thus, replacing streaming on-demand methods such as unicast VoD that are bandwidth consuming and latency sensitive. By that, the existing broadband bandwidth can be used and better utilized with CapEx and OpEx saving where the CAGR is likely to be higher than 100%.
The NSP can publish through a portal the content that is available as VoD or any other service offering. Any request for content from an accelerated P2P peer will create a private swarm which describes the WG content distributed utilizing P2P (In contrast to Internet P2P acceleration). W-PAP 382 will serve as the initial content distributor to the required content (by P2P peer 103) over NSP network 300. Any further requests will be distributed by P2P methods between the peers controlled by the W-TrS 384.
Two possible enhancements can be provided: The first, using DNS standard methods to redirect the initial content request by P2P peer 103 to the nearest content W-PAP by using URI (Universal Relocation Identifier) (Default DNS programmed within the P2P client software) as a method to get the IP address of the nearest content server W-PAP 382 that contains the requested content. The second accelerate the response time by downloading a preview or the first x minutes of the content and start pushing the content to the client, while in parallel continues downloading the remaining content.
Once a request has been made for a specific content (published in the NSP's portal for example) by a P2P peer 103, the W-TrS 384 tracks all the peers containing the requested content and forms the specific swarm (P2P Tracker Server) Fast distribution to user 144 is guaranteed by providing all the IP addresses of the high scored peers containing the missing chunks.
The two access swarms shown represent the accelerated internet P2P and walled garden P2P distribution models. Both tracker servers I-TrS and W-TrS maintain (per swarm) the lists of the peers containing the relevant chunks to be transferred according to the seed/leech and up/down available bandwidth, thereby getting real time adaptive self learning distribution model. Thus, the aggregative up/down utilized bandwidth per peer is easily calculated as the sum of concurrent flows to that peer. The calculation can be done by each of the servers or by another device such as the P2P Router 304 as illustrated in
Network Policy module 520 classifies the Ingress traffic 510 to four possible flows: 511, 512, 513 and 514.
Flow 511 represents classified P2P traffic to be directed to module flow Logic 555 for additional flow decisions controlled by the Policy Data-Base 580. Flows might be redirected to logical farms 541-54X for a variety of added functionalities (e.g., cryptography, caching, etc . . . ) and forwarded through the bandwidth shaping queues (controlled by policy 570) as egress traffic (590). Policy database 580 provisions the device modules: network policy module 520, admission control (AC) 560 and flow Logic 555. The import provisioning interface might use a variety of existing interfaces to import the details of the registered customers.
Flow 512 represents classified P2P traffic to be directed to options module 530, which impliments in-line functionalities, and the directed to flow Logic 555 for additional flow decisions.
Flow 513 is the same as flow 512 implemented on top of background flows (non P2P), but without the option to redirect to flow logic 555 and farm logic 550 modules. Optionally, non-P2P sessions can be classified by network policy module 520 using the functionalities provided by flow logic 555 and farm logic 550.
Flow 514 represents traffic that gets no treatment besides bandwidth management 570.
Ingress Policy for P2P′ flows arriving from the internet are identified by the destination address (P2P′ network—keep in mind that for practical security reasons this subnet will be hided to the internet by NAPT function) and the P2P′ signature. In that case the traffic is redirected to the P2P′ network as the initial seed to the swarm, else it is already a part of a other traffic flows and redirected to the access network (through the BRAS)
Egress Policy for P2P′ flows from the P2P′ network are redirected to the internet if the destination address is the internet, else forwarded to the access network
Egress Policies for P2P′ flows that arrive from the access network (peers) are based (upon classification) on any to any policy which means that the P2P router will be transparent and bridge/forward the flows to/from the internet. All the data exchange within internal peers is handled at the BRAS level.
Flows 511-514 are divided to two groups: 511,512 that are classified as P2P flows that should be accelerated (P2P′ client—NSP customer), and flows 513,514 that are classified as background flows (e.g., flows that are bridged and don't get any acceleration treatment). However, the NSP can control all the flows (bandwidth management 570 or other functionalities 530) as explained before (
Two basic further classifications are made to split the flows individually, which take place under the configured polices 580 controlling the AC 560 and Bandwidth management filters 570.
Both flows 511 and 512 after identification are checked by the flow logic 555 upon specific attributes (L3-7 keys) for redirection to one or more of the farms 541-54x (TrS farm for control flows and I-PAP farms for data flows or any other WG farms). If more complicated flow logic had to be applied, the flow will be once again redirected to another service farm in a cascaded way. In that way we apply a very flexible service model. Finally we apply rate limiting policies 570 on top of all the flows such they can be shaped according to the NSP policies.
While various embodiments/variations of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. Thus, the breadth and scope of the present invention should not be limited by any of the above-described exemplary embodiments.
Additionally, while the processes described above and illustrated in the drawings are shown as a sequence of steps, this was done solely for the sake of illustration. Accordingly, it is contemplated that some steps may be added, some steps may be omitted, and the order of the steps may be re-arranged.
Claims
1. A method for accelerating peer-to-peer (P2P) traffic, comprising:
- providing an access node for enabling a computer connected to the access node to access a network;
- creating a first virtual connection between the computer and the access node;
- creating a second virtual connection between the computer and the access node;
- using the second virtual circuit for accelerating P2P traffic destined for or transmitted from the computer.
2. The method of claim 1, wherein the access node is a multiplexer.
3. The method of claim 1, wherein the multiplexer is a digital subscriber line access multiplexer.
4. The method of claim 1, wherein the second virtual connection is a virtual circuit or a virtual local area network (VLAN).
5. The method of claim 1, wherein the first virtual connection has a first end point routing address that is allocated by a first service provider, and the second virtual connection has a second end point routing address that is allocated by a second service provider.
6. The method of claim 5, wherein the first service provider is an internet service provider and the second service provider is a network service provider.
7. The method of claim 1, further comprising connecting a P2P router between the access node and a public network.
8. The method of claim 7, wherein the public network is the Internet.
9. The method of claim 8, wherein all traffic from the computer to the Internet passes through the P2P router.
10. The method of claim 9, further comprising using the P2P router to create a P2P control plane.
11. The method of claim 10, wherein the P2P control plane provides an automated real-time adaptive quality-of-service plane without the need for traffic engineering.
12. The method of claim 1, further comprising using the second virtual connection to provide a walled garden based distribution service.
13. A system for accelerating peer-to-peer (P2P) traffic, comprising:
- a broadband access network;
- an access node for providing access to the broadband access network to a user's computer;
- a peer-to-peer (P2P) router connected between the broadband access network and a public network; and
- a P2P acceleration system, wherein the P2P acceleration system comprises:
- a P2P network to which the P2P router is connected,
- a peer acceleration proxy server connected to the P2P network, and
- a tracker server connected to the P2P network.
14. The system of claim 13, wherein the peer acceleration proxy (PAP) is configured to function as a P2P peer to download missing chunks of data that are sought by the user's computer.
15. The system of claim 14, wherein the PAP is configured to download the missing chunks of data via public swarms over the Internet.
16. The system of claim 15, wherein the tracker server is configured to manage a private swarm.
17. The system of claim 16, further comprising a walled garden acceleration system.
18. The system of claim 17, wherein the walled garden acceleration system comprises:
- a walled garden proxy server configured to enable downloading of content from content providers; and
- a walled garden tracker server.
Type: Application
Filed: May 15, 2007
Publication Date: Nov 20, 2008
Inventors: Yehuda Zisapel (Tel Aviv), David Aviv (Tel Aviv)
Application Number: 11/748,678
International Classification: H04L 12/56 (20060101); H04L 12/28 (20060101);